vicsanjinez / wazuh-config
Configurations to implement Wazuh
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for wazuh-config
- ☆33Updated last year
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆21Updated this week
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- A collection of various SIEM rules relating to malware family groups.☆61Updated 4 months ago
- SIEM Cheat Sheet☆72Updated last year
- Playbooks for SOC Analysts☆143Updated last year
- Useful resources about phishing email analysis☆77Updated 2 years ago
- Wazuh integration TheHive☆33Updated last year
- ☆157Updated 8 months ago
- Tools for simulating threats☆174Updated last year
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆51Updated 5 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆74Updated 10 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆157Updated this week
- ☆24Updated last year
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆72Updated 2 years ago
- ☆54Updated 3 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆114Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- ☆42Updated last year
- MISP Playbooks☆174Updated 3 weeks ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆86Updated 5 months ago
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- ☆31Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆202Updated last year
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆24Updated last month
- This repository contains Splunk queries to hunt some anomalies☆38Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆165Updated 4 months ago
- Security Scripts and Sources for daily usage.☆47Updated last week
- Some important DFIR Resources☆82Updated last year